Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), 2006. ,
DOI : 10.1109/SP.2006.32
URL : http://theory.stanford.edu/people/jcm/papers/barth-datta-mitchell-nissenbaum-2006.pdf
Privacy and Utility in Business Processes, 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007. ,
DOI : 10.1109/CSF.2007.26
S4P: A Generic Language for Specifying Privacy Preferences and Policies, 2010. ,
Refining interval temporal logic specifications, Transformation-Based Reactive Systems Development, 1997. ,
DOI : 10.1016/0304-3975(94)90096-5
URL : http://www.cse.dmu.ac.uk/~cau/papers/itlextension.ps.gz
A Survey of Automated Techniques for Formal Software Verification, In IEEE Trans. on CAD of Integrated Circuits and Systems, 2008. ,
A Privacy Preservation Model for Facebook-Style Social Network Systems, ESORICS, 2009. ,
Privacy Design Strategies, ICT Systems Security and Privacy Protection, 2014. ,
DOI : 10.1007/978-3-642-55415-5_38
URL : https://hal.archives-ouvertes.fr/hal-01370395
Control over Personal Data: True Remedy or Fairy Tale? SCRIPTed, 2015. ,
DOI : 10.2966/scrip.120115.3
Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, p.2010 ,
DOI : 10.1016/j.cosrev.2010.02.002
A formal privacy management framework, Formal Aspects in Security and Trust, 2008. ,
Beyond Access Control: Managing Online Privacy via Exposure, Proceedings 2014 Workshop on Usable Security, 2014. ,
DOI : 10.14722/usec.2014.23046
URL : http://www.mpi-sws.org/~druschel/publications/usec2014-exposure.pdf
A Formal Privacy Policy Framework for Social Networks, 12th International Conference on Software Engineering and Formal Methods (SEFM), 2014. ,
DOI : 10.1007/978-3-319-10431-7_30
The U CON ABC Usage Control Model, ACM Transactions on Information and System Security, 2004. ,
A Position Paper: A Usage Control (UCON) Model for Social Networks Privacy, 2010. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, 2008. ,
DOI : 10.1145/359168.359176
The Right to Privacy. Accessed on, pp.2015-2026 ,
Formal model and policy specification of usage control, ACM Transactions on Information and System Security, vol.8, issue.4, 2005. ,
DOI : 10.1145/1108906.1108908
URL : http://www.list.gmu.edu/journals/tissec/p351-zhang.pdf